J. Picard, Digital authentication with copy-detection patterns, Optical Security and Counterfeit Deterrence Techniques V, pp.176-183, 2004.
DOI : 10.1117/12.528055

R. Pappu, B. Recht, J. Taylor, and N. Gershenfeld, Physical One-Way Functions, Science, vol.297, issue.5589, pp.2026-2030, 2002.
DOI : 10.1126/science.1074376

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.83.6166

C. Baras and F. Cayre, 2D Bar-Codes for Authentication : A Security Approach, Proc. of EUSIPCO, Romania, 2012.
URL : https://hal.archives-ouvertes.fr/hal-00709394

K. Solanki, U. Madhow, B. Manjunath, and S. Chandrasekaran, Modeling the print-scan process for resilient data hiding, Security, Steganography, and Watermarking of Multimedia Contents VII, 2005.
DOI : 10.1117/12.588002

L. F. Fenton, The Sum of Log-Normal Probability Distributions in Scatter Transmission Systems, IEEE Transactions on Communications, vol.8, issue.1, pp.57-67, 1960.
DOI : 10.1109/TCOM.1960.1097606